學術產出-學位論文

題名 工作場所勞動者資訊隱私權之初探性研究
作者 洪敦彥
貢獻者 韓志翔
洪敦彥
關鍵詞 代理理論
資訊生命週期
隱私權
隱私侵擾行為
組織控制
日期 2004
上傳時間 18-九月-2009 15:43:09 (UTC+8)
摘要 代理理論認為,雇主對勞動者,有減低資訊不對稱之需求,從而避免勞動者之任何投機行為與偏差行為損及其利益。不過,雇主為減低資訊不對稱所為之隱私侵擾行為,卻涉及到勞動者資訊生命週期的各個階段,從資訊的獲得、處理、儲存、散播與利用等,皆與隱私權的爭議密不可分,並且同時與管理效能息息相關。

本文以當代之隱私權理論為經,以工作場所中勞動者資訊生命週期的各階段為緯,配合我國法律現況與國際保障趨勢,透過文獻分析法,以及訪談研究後發現:1. 國內雇主的隱私侵擾行為以行為監督、資料監控為主,實施檢測之隱私侵擾行為不若國外發達;2.國內缺少對工作場所隱私侵擾行為之相關立法規範;3.國內雇主實施組織控制的方式有直接與間接兩者;4.隱私侵擾行為同時會為組織帶來正功能與負功能;5. 雇主隱私侵擾行為之動機乃是透過瞭解員工的勞動過程、本身條件,以減低其資訊不對稱的劣勢,目的是為了發揮組織控制之管理功能;6.組織取得臨時員工之個人資料項目較正式員工少,而離職員工的個人資料管理較模糊。最後,本文分別對政府管制、人力資源主管/雇主與勞動者等三方面提供不同之建議,並指出後續研究方向。
參考文獻 一、中文部分
王佳煌
民90「資訊科技與監視宇宙」,東吳社會學報,第十期,頁1-35。
王郁琦
民89「工作場所中電子郵件隱私權之研究」,2000網路與社會研討會論文,國立清華大學社會學研究所主辦。
江岷欽
民74 「組織控制的類型分析」,公共行政學報,第一期,頁81-116。
民82 組織分析,台北:五南圖書。
李誠主編
民90高科技產業人力資源管理,台北:天下文化。
吳懿婷譯(Ellen Alderman & Caroline Kennedy原著)
民90隱私的權利,台北:商周。
吳瓊恩
民85行政學,台北:三民書局。
吳信如譯(Reinhard K. Sprenger原著)
民92個體的崛起,台北:時報。
林杏子
民91資訊倫理,台北:華泰。
周文祥、慕心編譯(Peter E. Drucker原著)
民87,巨變時代的管理,台北:商周。
周鴻玲譯(Charles Perrow原著)
民77組織社會學,台北:桂冠。
周慧蓮
民93 「資訊隱私保護爭議之國際化」,月旦法學雜誌,第一0四期,頁112-132。
席汝楫
民86 社會與行為科學研究方法,台北:五南。
紀佳伶
民89「資訊隱私權之探討—以國民卡所引發的爭議為例」,公共行政學報,第四期,頁289-322。
洪敦彥
民92「工作場所隱私權之初探性研究」,第七屆公共行政博碩士論文研討會,政大公共行政系主辦。
除曉慧譯(Joseph L. Badaracco, Jr.原著)
民88 對與對的抉擇,台北:臉譜文化。
郭貞伶、陳雅汝譯(Ronald Dworkin原著)
民91生命的自主權,台北:商周。
郭煌發
民84犯罪預防,桃園:中央警察大學。
陳月霞譯(Anne Wells Branscomb原著)
民85出賣資訊,台北:時報文化。
陳瑤華
民92「自主與民主」,人文及社會科學集刊,第十五卷,第二期,頁339-363.。
許文義
民90個人資料保護法論,台北:三民。
葉玟妤
民92科技人的法律保護,台北:商周。
詹文凱
民87隱私權之研究,台灣大學法律研究所博士論文。
劉昭博
民87資訊不對稱與政府投機行為之研究,政治大學公共行政研究所碩士論文。
焦興鎧
民92「工作場所規範之最新發展趨勢—美國之經驗(上)」,萬國法律,第一二九期,頁83-94。
民92「工作場所規範之最新發展趨勢—美國之經驗(下)」,萬國法律,第一三0期,頁103-108。
曾隆興
民89「隱私權之公法上保護及其界限」,台灣行政法學會主編,行政法爭議問題研究(上),頁679-718,台北:五南。
劉士豪
民91「網路資訊社會勞工人格權的保護」,政大勞動學報,第十二期,頁187-218。
劉尚志主編
民92「2003網路法制與犯罪偵防研討會論文集」,國立交通大學科技法律研究所。
劉靜怡譯(Lawrence Lessig原著)
民86「資訊科技與隱私權焦慮—誰有權塑造我的網路形象」,當代,第六卷,頁78-91。
民91網路自由與法律,台北:商周。
歐陽敏,陳永芳譯(Peter W. F. Davies主編)
民90企業倫理,台北:韋伯文化。
蔡明興譯(Archie B. Carroll原著)
民77企業與社會,台北:桂冠。
蕭美惠譯(David Brin原著)
民88透明社會:個人隱私vs.資訊自由,台北:先覺出版。
藍培青
民86隱私權在美國演進歷程之研究,淡江大學美國研究所博士論文。
謝清佳、吳琮璠
民92資訊管理:理論與實務,台北:智勝文化。
謝國雄
民86純勞動:台灣勞動體制諸論,台北:中研院社研所籌備處。
二、英文部分
ACLU Special Report.
1997 “Surveillance Incorporated: American Workers Forfeit Privacy for a Paycheck,” Rights to Privacy. Robert Emmet Long, Ed. New York: The H. W. Wilson Co..
Addley, Ken
1997 Occupational Stress-a practical approach, Reed Educational and Professional.
Ambrose, Maureen L. and G. Stoney Alder
2000“Designing, Implementing, and Utilizing Computerized Performance Monitoring: Enhancing Organizational Justice”, Research in Personnel and Human Resources Management, Vol.18, pp.187-219.
Alderman, Ellen & Caroline Kennedy
1997, The Right to Privacy, Business Weekly Publications, Inc. Published by arrangement with International Creative Management, Inc.
Alfino, Mark & G. Randolph Mayes
2003, “Reconstructing the Right to Privacy”, Social Theory and Practice, Vol.29, No1.
Altman, I.,
1975 ,Environment and social behavior: Privacy, personal space, territory, and crowding. Pacific Grove, CA: Brooks/Cole.
1977 Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33, pp.66-83.
Barnard, Chester
1938, The Function of the Executive, Cambridge, Mass: Harvard University Press.
Bogart, Dood H.
1980“Feedback, Feedforword, and Feedwithin: Strategic Information in System.”Behavioral Science, Vol.25, No.4.
Braverman, H.
1974 Labor and Monopoly Capital. New York: Monthly Review.
Brown, E.L
1997“The myth of E-mail privacy”, Fortune, February 3, p.66.
Brown, Marvin T.
1990 Working Ethics: strategies for decision making and organizational responsibility, Jossey-Bass Inc.
Brown, W. S.
1997“Eye spy: Businesses keeping tabs on workers”.The Sunday Gazette Mail, p.1B.
Bylinsky, G.
1991“How companies spy on employees”,Fortune, Nov. 4, p131-140.
Cain, Rita Marie
2002“Global Privacy Concerns and Regulation-Is the United States a World Apart?,International Review of Law Computers & Technology, Vol.16, pp.23-34.
Cozzetto, Don A. and B. Pedeliski Theodore
1997 “Privacy and the Workplace: Technology and Public Employment.” Public Personnel Management, Vol.26, No.4, Dec.22, , p.515.
Dyer, Barbara
1979 Personnel systems and records. Gower Press.
Eisenhardt, K. M.
1989“Agency Theory: An Assessment and Review,”Academy of Management Review, Vol.14, No.1, pp.57-74.
Goffman, E.
1959 The presentation of self in everyday life. Garden City, NY: Doubleday.
Halpern, S.
1992 Big boss is watching you, Details, April, pp.18-23.
Hartman, Laura P.
2001“Technology and Ethics: Privacy in the Workplace”Business and Society Review, 106:1, p.1-27.
Hoffman, W. Michael, Laura P. Hartman and Mark Rowe
2003“You"ve Got Mail...And the Boss Knows: A Survey by the Center for Business Ethics and Internet Monitoring”, Business and Society Review, Vol.108, No,3, pp.285-307.
Hubbard, Joan C., Karen A. Forcht and Daphyne S. Thomas
1998“Human Resource Information Systems: An Overview of Current Ethical and Legal Issues”, Journal of Business Ethics, Vol.17, 1319-1323.
Hubbartt, William S.
1998 The New Battle Over Workplace Privacy. New York: AMACOM, American Management Association.
Inness, Julie C.
1992 Privacy, Intimacy and Isolation, Oxford University Press
John D. R. Craig
1999, Privacy and Employment Law, Hart Publishing Co., Oxford and Portland, Oregin.
Jourard, S. M.
1966. Some psychological aspects of privacy. Law and Contemporary Problems, 31, 307-318.
Kelvin, P.
1973“A social-psychological examination of privacy”. British Journal of Social Clinical Psychology, 12, pp.248-261.
Kovach, Kenneth A., Jennifer Jordan, Karen Tansey and Eve Framinan
2000“The Balance Between Employee Privacy And Employer Interests”, Business and Social Review, Vol.105, pp.289-298.
Laufer, R. S. & Wolfe, M.
1977“Privacy as a concept and a social issue: A multidimensional developmental theory”Journal of Social Issues, 33, pp.22-41.
Lawler, Edward E.
1976 Information and control in organizations, Pacific Palisades, Calif. : Goodyear Pub.
Linowes, D.
1996 A research survey of privacy in the workplace. Urbana, IL: The University of Illionis.
Lyon, David
1993 “An Electronic Panoption?—A Sociological Critique of Surveillance Theory.” The Sociological Review. 41(4)(November):653-678.
1994 The Electronic Eye—The Rise of Surveillance Society. Oxford: Polity Press.
1998 “The World Wide Web of Surveillance—The Internet and Off-World Power-Flows.”Information, Communication & Society. 1(1) (Spring): 91-105.
Margulis, Stephen T.
2003,“ Privacy as a Social Issue and Behavioral Concept”, Journal of Social Issues, Vol.59, No.2, pp.243-261.
Mason, Richard O., Florence M. Mason, and Mary J. Culnan
1995, Ethics of Information Management, Sage Publications.
Miller, Seumas & John Weckert
2000, “Pricacy, the Workplace and the Internet”, Journal of Business Ethics, Vol.28, pp.255-265.
Mishra, Jitendra M. & Suzanne M. Crampton.
1998 “Employee Monitoring: Privacy In The Workplace?”S.A.M. Advanced Management Journal, Vol.63, No.3, Summer, pp.4-14.
Perrow, C.
1986 Complex Organization: A Critical Essay, 3rd ed., New York: Random House.
Persson, Anders J. and Sven Ove Hansson
2003, “Privacy at Work-Ethical Criteria”, Journal of Business Ethics. Vol 42, 59-70,
Poster, Mark
1989 “Critical Theory and Poststructuralism—In Search of a Context.”Ithach and London: Cornell University Press.
Rosenberg, Richard S.
1999“The Workplace on the Verge of the 21th Century”,Journal of Business Ethics, Vol.22, pp.3-14.
Rowan, John R.
2000“The Moral Foundation of Employee Rights”,Journal of Business Ethics, Vol.24,pp355-361.
Rule, James B.
1996 “High-Tech Workplace Surveillance: What’s Really New?”In David Lyon and Elia Zureik. Eds. Computers, Surveillance, and Privacy. Minneapolis and London: University of Minnesota Press: 66-76.
Sarathy, Ravi and Christopher J. Robertson
2003“Strategic and Ethical Considerations in Managing Digital Privacy”, Journal of Business Ethics, Vol. 46, pp.111-126.
Simon, Herbert A.
1957, Administration Behavior, 2nd ed., New York: Macmillan.
Stone, Eugene F. and Dianna L. Stone
1990“Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms”, Research in Personnel and Human Resources Management, Vol.8, pp.349-411.
Vredenburgh, Donald and Yael Brender
1998“The Hierarchical Abuse of Power in Work Organizations”, Journal of Business Ethics, Vol.17, pp.1337-1347.
Warren, Samuel D. and Brandeis, Louis D.
1890, “The Right to Privacy”, Harvard Law Review, No.4, pp.193-220.
Westin, Alan F.
1968 Privacy and Freedom. London: Bodley Head.
1979“The Problem of Employee Privacy Still Troubles Management,”Fortune, June 4, pp.120-126.
2003 “Social and Political Dimensions of Privacy”, Journal of Social Issues, Vol.59, No.2, pp.431-453.
Will, Ian
1983 The Big Brother Society. London: Harrap.
Zuboff, Shoshana
1988 In the Age of the Smart Machine—The Future of Work and Power. New York: Basic Books.
描述 碩士
國立政治大學
公共行政研究所
90256001
93
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0902560011
資料類型 thesis
dc.contributor.advisor 韓志翔zh_TW
dc.contributor.author (作者) 洪敦彥zh_TW
dc.creator (作者) 洪敦彥zh_TW
dc.date (日期) 2004en_US
dc.date.accessioned 18-九月-2009 15:43:09 (UTC+8)-
dc.date.available 18-九月-2009 15:43:09 (UTC+8)-
dc.date.issued (上傳時間) 18-九月-2009 15:43:09 (UTC+8)-
dc.identifier (其他 識別碼) G0902560011en_US
dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/35685-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 公共行政研究所zh_TW
dc.description (描述) 90256001zh_TW
dc.description (描述) 93zh_TW
dc.description.abstract (摘要) 代理理論認為,雇主對勞動者,有減低資訊不對稱之需求,從而避免勞動者之任何投機行為與偏差行為損及其利益。不過,雇主為減低資訊不對稱所為之隱私侵擾行為,卻涉及到勞動者資訊生命週期的各個階段,從資訊的獲得、處理、儲存、散播與利用等,皆與隱私權的爭議密不可分,並且同時與管理效能息息相關。

本文以當代之隱私權理論為經,以工作場所中勞動者資訊生命週期的各階段為緯,配合我國法律現況與國際保障趨勢,透過文獻分析法,以及訪談研究後發現:1. 國內雇主的隱私侵擾行為以行為監督、資料監控為主,實施檢測之隱私侵擾行為不若國外發達;2.國內缺少對工作場所隱私侵擾行為之相關立法規範;3.國內雇主實施組織控制的方式有直接與間接兩者;4.隱私侵擾行為同時會為組織帶來正功能與負功能;5. 雇主隱私侵擾行為之動機乃是透過瞭解員工的勞動過程、本身條件,以減低其資訊不對稱的劣勢,目的是為了發揮組織控制之管理功能;6.組織取得臨時員工之個人資料項目較正式員工少,而離職員工的個人資料管理較模糊。最後,本文分別對政府管制、人力資源主管/雇主與勞動者等三方面提供不同之建議,並指出後續研究方向。
zh_TW
dc.description.tableofcontents 致謝………………………………………………………........ I
摘要…………………………………………………………………..…….II
目次…………………………………………………………………….….III
表目錄………………………………………………………………………..IV
圖目錄………………………………………………………………………...V
第1章 緒論…………………………………………………………………...1
1.1 研究動機與目的………………………………………………………….1
1.2 研究方法與流程………………………………………………………….5
1.3 研究範圍與限制………………………………………………………….8
1.4 重要名詞界定………………………………………………………...13
第2章 文獻探討與相關理論…………………………………………………18
2.1 當代隱私權理論……………………………………………………...18
2.2 資訊生命週期理論……………………………………………………..23
2.3 工作場所資訊隱私權相關文獻探討…………………………………..27
2.4 代理理論、隱私侵擾行為與管理效能…...………………………..29
第3章 工作場所勞動者資訊隱私權之探討……………………………….45
3.1 工作場所勞動者資訊隱私權之歷史背景:美國經驗…………………45
3.2 國內外工作場所勞動者資訊隱私權之規範現況……………………..56
3.3 管制工作場所勞動者資訊隱私權之探討:倫理判斷…………………68
3.4 權利最低標準之論證:CRAIG的觀點………………………………..71
第4章 研究設計與分析…………………………………………………….79
4.1 NW實業公司…………………………………………………………….79
4.2 BL網路公司……………………………………………………………..84
4.3 GC基金會……………………………………………………………….88
4.4 TF汽車製造公司………………………………………………………..93
第5章 結論……………………………………………………………………98
5.1 研究發現…………………………………………………………...98
5.2 研究建議……………………………………………………………….100
參考文獻……………………………………………………………………107
附錄…………………………………………………………………………116
訪談問題大綱………………………………………………………………116
zh_TW
dc.format.extent 15586 bytes-
dc.format.extent 16618 bytes-
dc.format.extent 31973 bytes-
dc.format.extent 219573 bytes-
dc.format.extent 352234 bytes-
dc.format.extent 299520 bytes-
dc.format.extent 200761 bytes-
dc.format.extent 164738 bytes-
dc.format.extent 111172 bytes-
dc.format.extent 62773 bytes-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.format.mimetype application/pdf-
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0902560011en_US
dc.subject (關鍵詞) 代理理論zh_TW
dc.subject (關鍵詞) 資訊生命週期zh_TW
dc.subject (關鍵詞) 隱私權zh_TW
dc.subject (關鍵詞) 隱私侵擾行為zh_TW
dc.subject (關鍵詞) 組織控制zh_TW
dc.title (題名) 工作場所勞動者資訊隱私權之初探性研究zh_TW
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) 一、中文部分zh_TW
dc.relation.reference (參考文獻) 王佳煌zh_TW
dc.relation.reference (參考文獻) 民90「資訊科技與監視宇宙」,東吳社會學報,第十期,頁1-35。zh_TW
dc.relation.reference (參考文獻) 王郁琦zh_TW
dc.relation.reference (參考文獻) 民89「工作場所中電子郵件隱私權之研究」,2000網路與社會研討會論文,國立清華大學社會學研究所主辦。zh_TW
dc.relation.reference (參考文獻) 江岷欽zh_TW
dc.relation.reference (參考文獻) 民74 「組織控制的類型分析」,公共行政學報,第一期,頁81-116。zh_TW
dc.relation.reference (參考文獻) 民82 組織分析,台北:五南圖書。zh_TW
dc.relation.reference (參考文獻) 李誠主編zh_TW
dc.relation.reference (參考文獻) 民90高科技產業人力資源管理,台北:天下文化。zh_TW
dc.relation.reference (參考文獻) 吳懿婷譯(Ellen Alderman & Caroline Kennedy原著)zh_TW
dc.relation.reference (參考文獻) 民90隱私的權利,台北:商周。zh_TW
dc.relation.reference (參考文獻) 吳瓊恩zh_TW
dc.relation.reference (參考文獻) 民85行政學,台北:三民書局。zh_TW
dc.relation.reference (參考文獻) 吳信如譯(Reinhard K. Sprenger原著)zh_TW
dc.relation.reference (參考文獻) 民92個體的崛起,台北:時報。zh_TW
dc.relation.reference (參考文獻) 林杏子zh_TW
dc.relation.reference (參考文獻) 民91資訊倫理,台北:華泰。zh_TW
dc.relation.reference (參考文獻) 周文祥、慕心編譯(Peter E. Drucker原著)zh_TW
dc.relation.reference (參考文獻) 民87,巨變時代的管理,台北:商周。zh_TW
dc.relation.reference (參考文獻) 周鴻玲譯(Charles Perrow原著)zh_TW
dc.relation.reference (參考文獻) 民77組織社會學,台北:桂冠。zh_TW
dc.relation.reference (參考文獻) 周慧蓮zh_TW
dc.relation.reference (參考文獻) 民93 「資訊隱私保護爭議之國際化」,月旦法學雜誌,第一0四期,頁112-132。zh_TW
dc.relation.reference (參考文獻) 席汝楫zh_TW
dc.relation.reference (參考文獻) 民86 社會與行為科學研究方法,台北:五南。zh_TW
dc.relation.reference (參考文獻) 紀佳伶zh_TW
dc.relation.reference (參考文獻) 民89「資訊隱私權之探討—以國民卡所引發的爭議為例」,公共行政學報,第四期,頁289-322。zh_TW
dc.relation.reference (參考文獻) 洪敦彥zh_TW
dc.relation.reference (參考文獻) 民92「工作場所隱私權之初探性研究」,第七屆公共行政博碩士論文研討會,政大公共行政系主辦。zh_TW
dc.relation.reference (參考文獻) 除曉慧譯(Joseph L. Badaracco, Jr.原著)zh_TW
dc.relation.reference (參考文獻) 民88 對與對的抉擇,台北:臉譜文化。zh_TW
dc.relation.reference (參考文獻) 郭貞伶、陳雅汝譯(Ronald Dworkin原著)zh_TW
dc.relation.reference (參考文獻) 民91生命的自主權,台北:商周。zh_TW
dc.relation.reference (參考文獻) 郭煌發zh_TW
dc.relation.reference (參考文獻) 民84犯罪預防,桃園:中央警察大學。zh_TW
dc.relation.reference (參考文獻) 陳月霞譯(Anne Wells Branscomb原著)zh_TW
dc.relation.reference (參考文獻) 民85出賣資訊,台北:時報文化。zh_TW
dc.relation.reference (參考文獻) 陳瑤華zh_TW
dc.relation.reference (參考文獻) 民92「自主與民主」,人文及社會科學集刊,第十五卷,第二期,頁339-363.。zh_TW
dc.relation.reference (參考文獻) 許文義zh_TW
dc.relation.reference (參考文獻) 民90個人資料保護法論,台北:三民。zh_TW
dc.relation.reference (參考文獻) 葉玟妤zh_TW
dc.relation.reference (參考文獻) 民92科技人的法律保護,台北:商周。zh_TW
dc.relation.reference (參考文獻) 詹文凱zh_TW
dc.relation.reference (參考文獻) 民87隱私權之研究,台灣大學法律研究所博士論文。zh_TW
dc.relation.reference (參考文獻) 劉昭博zh_TW
dc.relation.reference (參考文獻) 民87資訊不對稱與政府投機行為之研究,政治大學公共行政研究所碩士論文。zh_TW
dc.relation.reference (參考文獻) 焦興鎧zh_TW
dc.relation.reference (參考文獻) 民92「工作場所規範之最新發展趨勢—美國之經驗(上)」,萬國法律,第一二九期,頁83-94。zh_TW
dc.relation.reference (參考文獻) 民92「工作場所規範之最新發展趨勢—美國之經驗(下)」,萬國法律,第一三0期,頁103-108。zh_TW
dc.relation.reference (參考文獻) 曾隆興zh_TW
dc.relation.reference (參考文獻) 民89「隱私權之公法上保護及其界限」,台灣行政法學會主編,行政法爭議問題研究(上),頁679-718,台北:五南。zh_TW
dc.relation.reference (參考文獻) 劉士豪zh_TW
dc.relation.reference (參考文獻) 民91「網路資訊社會勞工人格權的保護」,政大勞動學報,第十二期,頁187-218。zh_TW
dc.relation.reference (參考文獻) 劉尚志主編zh_TW
dc.relation.reference (參考文獻) 民92「2003網路法制與犯罪偵防研討會論文集」,國立交通大學科技法律研究所。zh_TW
dc.relation.reference (參考文獻) 劉靜怡譯(Lawrence Lessig原著)zh_TW
dc.relation.reference (參考文獻) 民86「資訊科技與隱私權焦慮—誰有權塑造我的網路形象」,當代,第六卷,頁78-91。zh_TW
dc.relation.reference (參考文獻) 民91網路自由與法律,台北:商周。zh_TW
dc.relation.reference (參考文獻) 歐陽敏,陳永芳譯(Peter W. F. Davies主編)zh_TW
dc.relation.reference (參考文獻) 民90企業倫理,台北:韋伯文化。zh_TW
dc.relation.reference (參考文獻) 蔡明興譯(Archie B. Carroll原著)zh_TW
dc.relation.reference (參考文獻) 民77企業與社會,台北:桂冠。zh_TW
dc.relation.reference (參考文獻) 蕭美惠譯(David Brin原著)zh_TW
dc.relation.reference (參考文獻) 民88透明社會:個人隱私vs.資訊自由,台北:先覺出版。zh_TW
dc.relation.reference (參考文獻) 藍培青zh_TW
dc.relation.reference (參考文獻) 民86隱私權在美國演進歷程之研究,淡江大學美國研究所博士論文。zh_TW
dc.relation.reference (參考文獻) 謝清佳、吳琮璠zh_TW
dc.relation.reference (參考文獻) 民92資訊管理:理論與實務,台北:智勝文化。zh_TW
dc.relation.reference (參考文獻) 謝國雄zh_TW
dc.relation.reference (參考文獻) 民86純勞動:台灣勞動體制諸論,台北:中研院社研所籌備處。zh_TW
dc.relation.reference (參考文獻) 二、英文部分zh_TW
dc.relation.reference (參考文獻) ACLU Special Report.zh_TW
dc.relation.reference (參考文獻) 1997 “Surveillance Incorporated: American Workers Forfeit Privacy for a Paycheck,” Rights to Privacy. Robert Emmet Long, Ed. New York: The H. W. Wilson Co..zh_TW
dc.relation.reference (參考文獻) Addley, Kenzh_TW
dc.relation.reference (參考文獻) 1997 Occupational Stress-a practical approach, Reed Educational and Professional.zh_TW
dc.relation.reference (參考文獻) Ambrose, Maureen L. and G. Stoney Alderzh_TW
dc.relation.reference (參考文獻) 2000“Designing, Implementing, and Utilizing Computerized Performance Monitoring: Enhancing Organizational Justice”, Research in Personnel and Human Resources Management, Vol.18, pp.187-219.zh_TW
dc.relation.reference (參考文獻) Alderman, Ellen & Caroline Kennedyzh_TW
dc.relation.reference (參考文獻) 1997, The Right to Privacy, Business Weekly Publications, Inc. Published by arrangement with International Creative Management, Inc.zh_TW
dc.relation.reference (參考文獻) Alfino, Mark & G. Randolph Mayeszh_TW
dc.relation.reference (參考文獻) 2003, “Reconstructing the Right to Privacy”, Social Theory and Practice, Vol.29, No1.zh_TW
dc.relation.reference (參考文獻) Altman, I.,zh_TW
dc.relation.reference (參考文獻) 1975 ,Environment and social behavior: Privacy, personal space, territory, and crowding. Pacific Grove, CA: Brooks/Cole.zh_TW
dc.relation.reference (參考文獻) 1977 Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33, pp.66-83.zh_TW
dc.relation.reference (參考文獻) Barnard, Chesterzh_TW
dc.relation.reference (參考文獻) 1938, The Function of the Executive, Cambridge, Mass: Harvard University Press.zh_TW
dc.relation.reference (參考文獻) Bogart, Dood H.zh_TW
dc.relation.reference (參考文獻) 1980“Feedback, Feedforword, and Feedwithin: Strategic Information in System.”Behavioral Science, Vol.25, No.4.zh_TW
dc.relation.reference (參考文獻) Braverman, H.zh_TW
dc.relation.reference (參考文獻) 1974 Labor and Monopoly Capital. New York: Monthly Review.zh_TW
dc.relation.reference (參考文獻) Brown, E.Lzh_TW
dc.relation.reference (參考文獻) 1997“The myth of E-mail privacy”, Fortune, February 3, p.66.zh_TW
dc.relation.reference (參考文獻) Brown, Marvin T.zh_TW
dc.relation.reference (參考文獻) 1990 Working Ethics: strategies for decision making and organizational responsibility, Jossey-Bass Inc.zh_TW
dc.relation.reference (參考文獻) Brown, W. S.zh_TW
dc.relation.reference (參考文獻) 1997“Eye spy: Businesses keeping tabs on workers”.The Sunday Gazette Mail, p.1B.zh_TW
dc.relation.reference (參考文獻) Bylinsky, G.zh_TW
dc.relation.reference (參考文獻) 1991“How companies spy on employees”,Fortune, Nov. 4, p131-140.zh_TW
dc.relation.reference (參考文獻) Cain, Rita Mariezh_TW
dc.relation.reference (參考文獻) 2002“Global Privacy Concerns and Regulation-Is the United States a World Apart?,International Review of Law Computers & Technology, Vol.16, pp.23-34.zh_TW
dc.relation.reference (參考文獻) Cozzetto, Don A. and B. Pedeliski Theodorezh_TW
dc.relation.reference (參考文獻) 1997 “Privacy and the Workplace: Technology and Public Employment.” Public Personnel Management, Vol.26, No.4, Dec.22, , p.515.zh_TW
dc.relation.reference (參考文獻) Dyer, Barbarazh_TW
dc.relation.reference (參考文獻) 1979 Personnel systems and records. Gower Press.zh_TW
dc.relation.reference (參考文獻) Eisenhardt, K. M.zh_TW
dc.relation.reference (參考文獻) 1989“Agency Theory: An Assessment and Review,”Academy of Management Review, Vol.14, No.1, pp.57-74.zh_TW
dc.relation.reference (參考文獻) Goffman, E.zh_TW
dc.relation.reference (參考文獻) 1959 The presentation of self in everyday life. Garden City, NY: Doubleday.zh_TW
dc.relation.reference (參考文獻) Halpern, S.zh_TW
dc.relation.reference (參考文獻) 1992 Big boss is watching you, Details, April, pp.18-23.zh_TW
dc.relation.reference (參考文獻) Hartman, Laura P.zh_TW
dc.relation.reference (參考文獻) 2001“Technology and Ethics: Privacy in the Workplace”Business and Society Review, 106:1, p.1-27.zh_TW
dc.relation.reference (參考文獻) Hoffman, W. Michael, Laura P. Hartman and Mark Rowezh_TW
dc.relation.reference (參考文獻) 2003“You"ve Got Mail...And the Boss Knows: A Survey by the Center for Business Ethics and Internet Monitoring”, Business and Society Review, Vol.108, No,3, pp.285-307.zh_TW
dc.relation.reference (參考文獻) Hubbard, Joan C., Karen A. Forcht and Daphyne S. Thomaszh_TW
dc.relation.reference (參考文獻) 1998“Human Resource Information Systems: An Overview of Current Ethical and Legal Issues”, Journal of Business Ethics, Vol.17, 1319-1323.zh_TW
dc.relation.reference (參考文獻) Hubbartt, William S.zh_TW
dc.relation.reference (參考文獻) 1998 The New Battle Over Workplace Privacy. New York: AMACOM, American Management Association.zh_TW
dc.relation.reference (參考文獻) Inness, Julie C.zh_TW
dc.relation.reference (參考文獻) 1992 Privacy, Intimacy and Isolation, Oxford University Presszh_TW
dc.relation.reference (參考文獻) John D. R. Craigzh_TW
dc.relation.reference (參考文獻) 1999, Privacy and Employment Law, Hart Publishing Co., Oxford and Portland, Oregin.zh_TW
dc.relation.reference (參考文獻) Jourard, S. M.zh_TW
dc.relation.reference (參考文獻) 1966. Some psychological aspects of privacy. Law and Contemporary Problems, 31, 307-318.zh_TW
dc.relation.reference (參考文獻) Kelvin, P.zh_TW
dc.relation.reference (參考文獻) 1973“A social-psychological examination of privacy”. British Journal of Social Clinical Psychology, 12, pp.248-261.zh_TW
dc.relation.reference (參考文獻) Kovach, Kenneth A., Jennifer Jordan, Karen Tansey and Eve Framinanzh_TW
dc.relation.reference (參考文獻) 2000“The Balance Between Employee Privacy And Employer Interests”, Business and Social Review, Vol.105, pp.289-298.zh_TW
dc.relation.reference (參考文獻) Laufer, R. S. & Wolfe, M.zh_TW
dc.relation.reference (參考文獻) 1977“Privacy as a concept and a social issue: A multidimensional developmental theory”Journal of Social Issues, 33, pp.22-41.zh_TW
dc.relation.reference (參考文獻) Lawler, Edward E.zh_TW
dc.relation.reference (參考文獻) 1976 Information and control in organizations, Pacific Palisades, Calif. : Goodyear Pub.zh_TW
dc.relation.reference (參考文獻) Linowes, D.zh_TW
dc.relation.reference (參考文獻) 1996 A research survey of privacy in the workplace. Urbana, IL: The University of Illionis.zh_TW
dc.relation.reference (參考文獻) Lyon, Davidzh_TW
dc.relation.reference (參考文獻) 1993 “An Electronic Panoption?—A Sociological Critique of Surveillance Theory.” The Sociological Review. 41(4)(November):653-678.zh_TW
dc.relation.reference (參考文獻) 1994 The Electronic Eye—The Rise of Surveillance Society. Oxford: Polity Press.zh_TW
dc.relation.reference (參考文獻) 1998 “The World Wide Web of Surveillance—The Internet and Off-World Power-Flows.”Information, Communication & Society. 1(1) (Spring): 91-105.zh_TW
dc.relation.reference (參考文獻) Margulis, Stephen T.zh_TW
dc.relation.reference (參考文獻) 2003,“ Privacy as a Social Issue and Behavioral Concept”, Journal of Social Issues, Vol.59, No.2, pp.243-261.zh_TW
dc.relation.reference (參考文獻) Mason, Richard O., Florence M. Mason, and Mary J. Culnanzh_TW
dc.relation.reference (參考文獻) 1995, Ethics of Information Management, Sage Publications.zh_TW
dc.relation.reference (參考文獻) Miller, Seumas & John Weckertzh_TW
dc.relation.reference (參考文獻) 2000, “Pricacy, the Workplace and the Internet”, Journal of Business Ethics, Vol.28, pp.255-265.zh_TW
dc.relation.reference (參考文獻) Mishra, Jitendra M. & Suzanne M. Crampton.zh_TW
dc.relation.reference (參考文獻) 1998 “Employee Monitoring: Privacy In The Workplace?”S.A.M. Advanced Management Journal, Vol.63, No.3, Summer, pp.4-14.zh_TW
dc.relation.reference (參考文獻) Perrow, C.zh_TW
dc.relation.reference (參考文獻) 1986 Complex Organization: A Critical Essay, 3rd ed., New York: Random House.zh_TW
dc.relation.reference (參考文獻) Persson, Anders J. and Sven Ove Hanssonzh_TW
dc.relation.reference (參考文獻) 2003, “Privacy at Work-Ethical Criteria”, Journal of Business Ethics. Vol 42, 59-70,zh_TW
dc.relation.reference (參考文獻) Poster, Markzh_TW
dc.relation.reference (參考文獻) 1989 “Critical Theory and Poststructuralism—In Search of a Context.”Ithach and London: Cornell University Press.zh_TW
dc.relation.reference (參考文獻) Rosenberg, Richard S.zh_TW
dc.relation.reference (參考文獻) 1999“The Workplace on the Verge of the 21th Century”,Journal of Business Ethics, Vol.22, pp.3-14.zh_TW
dc.relation.reference (參考文獻) Rowan, John R.zh_TW
dc.relation.reference (參考文獻) 2000“The Moral Foundation of Employee Rights”,Journal of Business Ethics, Vol.24,pp355-361.zh_TW
dc.relation.reference (參考文獻) Rule, James B.zh_TW
dc.relation.reference (參考文獻) 1996 “High-Tech Workplace Surveillance: What’s Really New?”In David Lyon and Elia Zureik. Eds. Computers, Surveillance, and Privacy. Minneapolis and London: University of Minnesota Press: 66-76.zh_TW
dc.relation.reference (參考文獻) Sarathy, Ravi and Christopher J. Robertsonzh_TW
dc.relation.reference (參考文獻) 2003“Strategic and Ethical Considerations in Managing Digital Privacy”, Journal of Business Ethics, Vol. 46, pp.111-126.zh_TW
dc.relation.reference (參考文獻) Simon, Herbert A.zh_TW
dc.relation.reference (參考文獻) 1957, Administration Behavior, 2nd ed., New York: Macmillan.zh_TW
dc.relation.reference (參考文獻) Stone, Eugene F. and Dianna L. Stonezh_TW
dc.relation.reference (參考文獻) 1990“Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms”, Research in Personnel and Human Resources Management, Vol.8, pp.349-411.zh_TW
dc.relation.reference (參考文獻) Vredenburgh, Donald and Yael Brenderzh_TW
dc.relation.reference (參考文獻) 1998“The Hierarchical Abuse of Power in Work Organizations”, Journal of Business Ethics, Vol.17, pp.1337-1347.zh_TW
dc.relation.reference (參考文獻) Warren, Samuel D. and Brandeis, Louis D.zh_TW
dc.relation.reference (參考文獻) 1890, “The Right to Privacy”, Harvard Law Review, No.4, pp.193-220.zh_TW
dc.relation.reference (參考文獻) Westin, Alan F.zh_TW
dc.relation.reference (參考文獻) 1968 Privacy and Freedom. London: Bodley Head.zh_TW
dc.relation.reference (參考文獻) 1979“The Problem of Employee Privacy Still Troubles Management,”Fortune, June 4, pp.120-126.zh_TW
dc.relation.reference (參考文獻) 2003 “Social and Political Dimensions of Privacy”, Journal of Social Issues, Vol.59, No.2, pp.431-453.zh_TW
dc.relation.reference (參考文獻) Will, Ianzh_TW
dc.relation.reference (參考文獻) 1983 The Big Brother Society. London: Harrap.zh_TW
dc.relation.reference (參考文獻) Zuboff, Shoshanazh_TW
dc.relation.reference (參考文獻) 1988 In the Age of the Smart Machine—The Future of Work and Power. New York: Basic Books.zh_TW